23
5.2.3 WPA2- PSK
WPA2 (Wi-Fi Protected Access version 2) provides higher security than and WPA (Wi-Fi
Protected Access).
¾
WPA Algorithms:
Provides TKIP [Temporal Key Integrity Protocol] or AES
[Advanced Encryption Standard].
¾
Key:
Enter the pass phrase that consists of 8-63 ASCII characters.
¾
Key Renewal Interval:
Set the key’s renewal period, which tells the device how
often it should change the dynamic keys.
5.3 Wireless Access Control
Wireless access control is actually based on the MAC address to permit or forbid
specific
clients to access the wireless network.
¾
MAC address filter:
“
Permit
” indicates to allow the clients in the list to access the
wireless network, “
Forbid
” indicates to prevent the clients in the list from accessing
the wireless network.
¾
Configure MAC address:
Input the MAC addresses of the wireless clients to
implement the filter policy. Click “
Add
” to finish the MAC add operation.
¾
MAC Address list:
Show the added MAC addresses. You can add or delete them.
5.4 Connection Status
This screen shows wireless client’s connection status, including MAC address, Channel
bandwidth.
¾
MAC address:
Shows the MAC addresses of the hosts connected to the Router.
¾
Bandwidth:
Shows the channel bandwidth of the current connected hosts (wireless
clients).
Содержание ER-5840n
Страница 1: ......
Страница 4: ...APPENDIX 4 CLEAR WIRELESS CONFIGURATION 41 APPENDIX 5 REGULATORY INFORMATION 43...
Страница 6: ...2 Back panel port show take ER 5840N ER 5845N as an example...
Страница 7: ...3 Back panel port description...
Страница 32: ...28...